As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
The purpose of an authentication code is to give proof that a message is authentic, i.e. it was not sent by an imposter and it has not been altered on its way to the receiver. Secrecy could also be an issue here, but in many cases the receiver just wants to be sure that the message is genuine.
Unlike digital signature schemes, authentication codes aim at unconditional security. The opponent is assumed to have unlimited computer power. Many constructions of authentication codes are based on error correcting codes. After an introduction, an overview of these techniques will be given.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.